| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4ef9c695c176d73-6f81b74d-4d204288-a494b1d2-abc94cc11315e67478c47c42"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. _IEEE Transactions on Software Engineering_ 22(1):6–15 (1996). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6aa6927d04135fe-84c1a7e8-40514a83-8bdc-0ba403a7b3b4cc963ee8a6c5"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle, Inc. (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fb9dc3cb508082c-12bbfb1a-4a4142b9-972ebc42-56221362ef9c5af5ca357877"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro> \[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle, Inc. (2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5f4a0edd905f18e-20fd7158-4b714397-81078dee-5e2b81d10e99bbc5715f5b89"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7acf0a5ab9f40074-233b73dc-4c694865-bbcbba44-bec62057e191a6e3ef0185a4"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro> \[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/partialorder.html] (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9eacbe4b64664795-5ffff2d8-46ee49da-a24eaf2c-03efdbb5e0172c184dd2a9a2"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro> \[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/totalorder.html] (2006). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc57ad11d5dece2-f0cd0938-45b04041-81d7a219-d10ca1d77b9516d43f1667e8"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e293c102ab315e7f-85061c94-44f04192-a85aaba0-befae78f9a79628a1343e601"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e57858f8d5ae7556-6fc007b3-48024d7d-b52494f0-0614ab5d7513b098346394d5"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro> \[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9c7abd51480481b-06caaec8-40354b55-9c19a8b9-1d7282de8d7009e55bb5504b"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro> \[Bloch 2007\] Bloch, Joshua. [Effective Javaâ„¢ Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9eb1916d8a6a39d4-380b27a3-4d5649ce-8d63a1f3-579d054f1992e04b9cbb8eab"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad6a347df9c9590e-fe387e3a-4eaf43ef-b942a192-37ef6ab707d446e8e26b2d50"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro> \[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9522d01a940a6ce6-0660b316-4c584101-90c196d4-1805e4c87ea75b591067db73"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Javaâ„¢ Technology-Based Memory Model. JavaOne Conference (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fedb836f32ffa3af-e8d01c5e-4b8b4be8-865782f9-9dc7d2635019167bb4d393cf"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a0600084d214128-7e2e78ed-446f4d47-95c09e9d-e0775eb3baa09a7094976d05"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4927107c1676d4a-f48ea24e-45ff4434-926fa44a-45e4367730d4a10379030c78"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6186dcb34c092412-0d5bf5f5-4ea4464e-ad9fb30c-a4359219446f210b33bf9d0d"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bca0c784c50755a-a51dfe63-4de34c1c-94ce9783-157419af9d4cabe92a9f6b9a"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04014b03ec41cddf-f476e50e-442e4ea2-800dbaf1-5a6d0d2c221e8a422d65c1bc"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro> \[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48–54 (1981). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9c3f07d1f2b19e0-efc3b016-4aa0427a-baf7a530-383a0d14ee894978730067be"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro> \[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle, Inc. (2009). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6855a159db66541-043965e9-4c844cf6-80cc8ebe-4823d8486d03396eb67d9a49"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, Inc. JavaOne Conference (2007). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e31dac5af99e550a-a6153cb0-4915458c-94b68799-478a3d6aee343cf2f9e8c1cd"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Javaâ„¢ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc02a26e324f3df7-96b1efa3-433642d2-a8b88b50-a6cef3b86436f8b6aca117cb"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fcc6a1520c7307e-e44c3def-457c4ab6-ac99872b-830d72d1e9b49274a8fc1c64"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 2008\] MITRE Corporation. \[Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="339efe7765e671f0-9741df20-42fc4efb-a4de8e8d-e7dbfe82996e63106399bc1c"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d0b9930436c2116-b8e9951e-45934351-9e01aea4-e72de60583891543f92d4aa8"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee64e332522fa903-a0873a10-4d9c4c73-843097fe-fe1a960121f2f8c82cab87da"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: O’Reilly (2004). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb980c73ed5efbfc-51515d08-4dda4f89-9fde8a20-c3c2d7a2dfeeaf41a1188636"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro> \[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04f85f3f082711a5-4631e709-4dc244b5-895d84e6-4fa950a1ebb0292a6f88bdf8"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro> \[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7a28858c8abd66c-f343edb0-46c14423-a82eb407-8b3cab326655649b5742142e"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro> \[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143–155 (1966). doi: 10.1145/365230.365252. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba42a92f0ae13f12-634c0f83-40f44c81-a9688d49-808ed5ae93ff0cdc59f7490f"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. https://buildsecurityin.us-cert.gov (2006/2011). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="760b0e6f6851e245-f47f9523-4d6243a4-83d38992-068806df4d79b877ec7f4321"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro> \[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html]. CERT Vulnerability Analysis Blog (2008). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b423f4b7189dacee-866707a0-482f4a1c-a728aa7e-b167616e6553231b2829cbc2"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_. (2003). |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40bab567a8ba87c1-931fc842-49b54b2f-888abe7b-5845466b238387dfcf0354f9"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro> \[Dougherty 2009\] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c58cb08c40b37cea-4718f7ec-45b3495d-89beb8ca-ca3959f3790a6d4a7a142ac3"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 2008\] The Eclipse Platform (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c78414202d03f29-443c98c0-4ec641a5-af49ad7d-b4e6f2260832bd37a3848723"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro> \[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b0fe05dbf63f9c3-4cb45bdd-46734276-aa4e90c0-f1e8c32691ecd34d1235cbcd"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 2003\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29c8d89b26ca3131-daa6054a-4e8148c6-9c00bb09-fb5995753a43421d491671cf"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58318c02b3893ac5-a910890f-430e45ea-98ce86e8-e5dc0a59cc215fa6e49c3bc6"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro> \[Fairbanks 2007\] [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab0e25e40f129db6-e3cbfff6-4017404f-a7978d0b-8735603e43ad8a3563ad8ae9"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dcb0b13a3cecee6-f52bea32-40574193-bf758547-46624414e2c93519536d5d30"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c648e735aac9370-60895075-47274d60-9e77b4ca-521d7e4cbbc2a0f100ab9219"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 2005\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5f28e7db93bb0c8-8194c5dc-4eb44e7d-85a1a048-a883d2bcd5e6d456dac3d8a8"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro> \[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d2ed9e20baad0b9-18c8c22c-413c4ad2-8776bb63-d4054ff0a558bfd9ec6e35f9"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 2001\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b37d8d15615c179-208ed9f7-48fe455e-bee3b065-890afdfc236ba9ef33d65e83"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3af3c7ddaa062031-fd1a4768-47cc46e7-93558031-74948b3788d15d514f384ec3"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro> \[Gafter 2006\] [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72120b319aadea40-df2fe20f-46c44181-8461a886-651c214270d2651490f77c30"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62c2b4fe934dbd9b-7b2a4471-45e64d8a-a64cbe91-cc40fcc4253477a3749b74e7"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 2001\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ab97e69aae6e921-f79f20e2-46624820-b086a303-73191911b90550f364581e5b"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro> \[Goetz 2002\] [Java theory and practice: Don't let the "this" reference escape during construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63705907b2abcdaf-ca1a00bd-42ff45ad-8f18852c-ddf7ac40fa0abf46f23a118f"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 2004\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92e098598dffe225-0c616dde-45144136-890997f3-b36a46c0c0485722f231f736"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 2004b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="851873c2ab82ffdc-21496d8c-4aef4d60-9adfa4fb-8daf01f89c5bc50416ef309b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro> \[Goetz 2004c\] [Java theory and practice: Going atomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d0e00e7940d45df-fcabeb21-407f4a6b-ab588da4-eab2a4a783d2e8cd76404726"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 2005\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1b876a6a61dee8f-cdda6db6-42d0479a-b00d985d-cc907efccac0bd9f389e55ed"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro> \[Goetz 2005b\] [Java theory and practice: Plugging memory leaks with weak references|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="891ea7eb33be79af-0bdb44e2-4dd648b4-8ce4a0b5-107195a2d228a49bed1b6135"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 2006\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69877afc088124d0-d838152c-4e824f55-bf68a324-92584aeca1a43657a2fb6b38"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 2006b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4debe2c6bf727f2-ff1459bc-4ea94507-b1d9a4b9-7b07046b5d49da087569b3d1"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro> \[Goetz 2007\] [Java theory and practice: Managing volatility, Guidelines for using volatile variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cc0227bb5ecae56-302d6f9f-4fb8421a-8d49b405-d7997bac5fb3635aed591b80"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, Inc. March 1991. (1991) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5169c628c8705a34-68a637cb-42a44c92-bca5b84d-19ceacb1eb4c629cfad2dd6a"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 2003\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fa893ba608dbf9d-3343dc22-4fd14f40-91c59e0a-20d4c4d7e40b9739a8311933"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro> \[Grand 2002\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58cf414c6e9af6b4-c2bffbe1-4c0b4e54-8b18afbb-d12187a3aa486ae47173a9b9"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 2000\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88067abffd4602a5-807e42a2-49b34b51-b857a283-e15fe8c4b6d9711de4a052f6"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 2008\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99c27fe927574649-1185981f-412b4bd5-b24aac61-06a39a5c1d30fa19e846f668"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro> \[Grigg 2006\] [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c397788098cb98d1-04165879-411f4ebb-aec88aa6-64675d4587d963d1b290cf74"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro> \[Grosso 2001\] [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7bbe35fbea8988a-bca94310-42524343-92a29118-0451fe4feea6e83ccbe2b4c9"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 2005\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3e9c91604699c88-fa300eeb-49b540f0-9b74bbb5-e38634f7e3c08e1eba7ca994"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro> \[Haack 2006\] [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08388531b4d974f6-9e7d5cfe-402b478b-98449ea8-18b7267e7e55dfd6a2f5ce3c"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro> \[Haggar 2000\] Practical Javaâ„¢ Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b1780683717ef11-22ab2797-43964b82-85d48e99-16a6ee7b50eba2031b4aecfe"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 2000\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d3753a3ee69cbca-a9a61d64-4c594b25-80a4b43b-d133c648e5ae7a942241d7c5"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 2001\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f0a1fdf36b68914-79cca24f-41da4db8-bafa8580-dbdc03b73cfc8518cf9d51eb"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 1997\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="855a1ca7dcddb7cd-31f764b3-407e4204-8eefaa4d-3cfe6e73443008fa44bd5fca"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 1999\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccdd3d8104feb5bb-c47e0315-4b064f64-b4b9b172-64eddf5406d00c5117de2335"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 2006\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec64bf345663611c-1343e03d-430d40e4-ac7f9a85-8afb41f6a35d28cd7d027baf"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro> \[Hawtin 2008\] [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf5d6e5d744f0ae8-959c9a5d-42f84a00-a024a872-8ac5280903de19254ec22887"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 2003\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29acbb6ec4cf9650-66660beb-41f34f90-b46ab269-5fd25742972bf524a9dd3212"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro> \[Hitchens 2002\] Javaâ„¢ NIO, by Ron Hitchens. O'Reilly. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a953c8ae46f3952-ca47a694-45c44bb5-b26b8d13-079be53c2b8511a3479db439"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro> \[Hornig 2007\] [Advanced Javaâ„¢ Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6304f2da8f594470-fad12241-4ebb423c-a01880e7-394da41a9f95fb08ccc1c24d"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro> \[Hovemeyer 2007\] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ffef8586f837c47-48af7b0c-4f434b75-8941b305-e162c5851cf4b5ae32cebe19"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro> \[Hunt 1998\] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11bc0420db613315-ec18b572-438d4a13-93deb327-e23177b97d5665b87415859c"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d87de0ad2e42473e-bc8aa1f9-40024cec-9eec9b9b-ad2d97aa18d8f66d48409b38"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="237c1551f2e06fa5-fb0ead49-4f914423-800fb29f-a8cceba94b96b16f8128543a"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="421d318ead9d3fe0-78b88932-444c492d-9261a6c9-74a42702a3132d55528c4182"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4e3e2107e4acbce-6508388b-4beb442a-b612aaaf-a64e0b0cbdb817d8d531d6b5"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro> \[Java 2006\] [java - the Java application launcher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a76699daaa516b35-bf87dfd0-4b104308-8c6ea97c-16fe76e231d440a7362ca165"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="279e5ca6c4e5e7dd-ad346182-440b4009-a69488ef-e56afd142752ea76b7bbb1be"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 2004\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8686bb8690f887f0-b79936ee-46074de0-8d38a541-253f0f3b86e72199bffc2835"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2aa32a65abe77d8c-b3049705-4bc94f1c-9111b08c-1f3a8b0266a8c77bb77b922b"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 2004\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6948d870aef9847-13c62115-47f5487c-ba01991b-adffcd8e6a5540e845dddd9b"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 2008\] [Javaâ„¢ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 Dec 2008. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72f10df63f99b40e-ec0b5a86-49bd41a6-a7de85c2-5e44b3d596ec77f4459974ad"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f258309230d6efd2-09588951-43a24085-896faac0-5d3cce42f6f622f9377891b8"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro> \[JLS 2011\] Java Language Specification: Java SE 7 Edition. by James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. [The Java Language Specification.|http://download.oracle.com/javase/7/specs/jls/JLS-JavaSE7.pdf] (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f6a1e0af770c0c3-ae1c0d19-470c46f2-98c8b09c-ebce1d057c5a5a7b8c492a99"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76d1e73627584cd3-42bc35ca-49584250-add7ae54-663d518079277bf28d3b0782"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52133f0dfba27971-576d4a93-43594466-814990db-d0a7d449a805a194a0708880"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df7acac64bc1c5d4-b193cc87-4a224f2e-b325affe-b94ddd8318750186024baf10"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro> \[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01eb76d5590a931a-79a85f3b-4e764fd8-a911b2bb-bfa9993c952bd1bbfca53429"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1239790f9637be9-606aac37-41cf4f75-8195b171-986886b6b1bbf6aa4a284f05"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro> \[JPL 2006\] The Javaâ„¢ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30b1ce7d8be7f1cf-b4af5907-4e0049ca-9f0e8ba1-0093d287640356c26a16867c"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro> \[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ea47469fb4576f3-17e351b4-452a425d-87b3ac0a-138cfe1eebc7ac745597d70e"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0744db2355b2ab0-ec594170-4148409c-9f359a03-da1956ce4f5a5a9aaedc1eca"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41fb82d2963e8633-b90d4f27-47514773-bc6e87bf-7782a0def6a6a870438e77d1"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro> \[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="021b8fceced476fd-5235487a-4cd24885-94138a70-71d4d0a13106440037a40d50"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d82d634c95229b0a-74c01836-48934390-9bec87cd-2686cf597066c7aaff35e461"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb022154578cdae6-e70dc659-4850483f-8293b4aa-05c35268a1fe7e57ff9f3cd4"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro> \[Knoernschild 2001\] Javaâ„¢ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001) |
...
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="425f95a5e08ea98f-5ac16878-4af941b9-9726ab27-33447df6c1ca7ec1ac300660"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b16173205a388956-d9065c0c-4d1b45b2-ab5caaec-5c20e5a686266b730bd15a7d"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22faa35fa4d977a1-adbd950e-42eb4cad-9297aad0-e131d8d27d45788106086063"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro> \[Lea 2000b\] [Correct and Efficient Synchronization of Javaâ„¢ Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11540d93ba36da42-16eae6da-4ff943bc-84f38203-f4259f6fcdc21850e339be4d"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro> \[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d283837ca0cf7a1a-af815824-4e94447c-83cab2f4-360fa182a2a19bbd596f9b6c"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro> \[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="633d183caf49b9fe-950c4ced-4069467a-ac2db2f3-8ecf0075300d0c1e37c94bdd"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 1997\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15cf019ee0c848f9-35656206-445145c7-b9188835-e5f70f05e10fde9fd1f9a99d"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro> \[Liang 1998\] [Dynamic Class Loading in the Javaâ„¢ Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1fea114eab7c5ca-277a8077-49a3451b-8fdea36d-7dc17a6a29fc465fe5e7617c"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro> \[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f040ef2a69d78e9-f5a0085f-43124934-bf9794bc-daf234884605e1fe9930bb2c"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fa7db9b72b52ddf-94d0b308-40404d03-84b5b130-9e8c4da8f25b7f498e480bed"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08cd9f56665ddd7e-e8072464-48af41db-92d4b195-813942d90ced8f3354a8dd87"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro> \[Long 2011\] The CERT Oracle Secure Coding Standard for Java, by Fred Long, Dhruv Mohindra, Robert C. Seacord and Dean F. Sutherland, Addison-Wesley, SEI Series in Software Engineering. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea3ce094e6fcf830-b9a17ec7-497247e4-b92b85c0-586a9b065c86c6edf2a966f9"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47aa697dad1648b7-ef0a6b30-40e04e47-b60ba2b9-0a48c5c194a14eae4e88b4e8"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21c9f41df348d56b-c70487bd-439f4f2f-a3e68e3a-a1cceca7a6f7eb893d5115bc"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro> \[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a227c3939b3590c0-8b045a38-420c4adf-966ab924-3b90782be61137146962d50e"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro> \[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c838dd434c4a4dbe-51fe2340-49594658-99378596-26d00369142da93cf5cbae57"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro> \[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53abe19db931466f-02c7c062-490541f0-921ab017-c6224ab1bdf8fdaf54c9c060"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro> \[Manson 2006\] [The Javaâ„¢ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8052b201397f4f7-f262d118-41fd47ad-b926a7ca-8b4482f7c7ae500e4709563d"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro> \[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25fa4057401bc1b5-61ed6f4f-42a64e70-878aa98f-78bcb0b2f85c4979028110d9"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03febf87adfdee11-82bb0b05-4f184c43-9b5f87ea-bf56c6a91080a1788c60227d"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65c2dd86e33cef4f-cb756048-45af4c1a-a9a481dc-ee0a025036005ec2bbbb0c00"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro> \[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward Felten, JavaWorld.com. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79a774a139fa8697-0a0929e5-42584cd7-9711a94b-019a39020d1b643091f33c24"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro> \[Miller 2009\] [Javaâ„¢ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efeb1fb7ee7eaf09-1b1f616b-47c843e3-8a63a218-23c31d9ed59cbd59a3d6cd7f"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro> \[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb338bea365bbc90-3ea1b50d-44aa453f-b0aeaae3-a0678979400799779c80265b"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13572899e5ccd08a-ddb36c80-4780437b-9a1788f3-fdbb48ce49f0aece360b8186"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro> \[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38d741e175779c57-90ac821c-431e4eed-a162b1fa-401f1ae8fad942a582d34a33"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro> \[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cae6f9a09719a69-c3baa94f-4057437b-8561937a-30640adf9f95e8cf575aa8e8"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db0d76991380e01b-da163ac7-4e80409a-843a979c-67f2eb95addbcd0ccbd39440"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro> \[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d54c187a06a8b07f-cfd3d2b8-4b9e4d68-8d9d9aea-9feeeb8d5102e103767685ed"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e61915137681c7b8-cfc76e18-47c24c7f-bf67a27f-b4033d177b1e293830ae8612"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 2006b\] [Javaâ„¢ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7897433e9cc5b2da-996dab1d-4f654be4-a4188de4-f0e91ca0ffaceb5bb744321b"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro> \[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd4cb6d96ab17679-06ad74e8-44bc4493-954aa58f-61f67bd9b56a31833029b173"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17351a3eeacc5f4c-83c9e38a-47c8423e-9a628734-fd45c1adad059923c2b7ae0c"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc5abac72a171799-c024c4cf-414846e4-8ed5b779-2d5ac7cfa171904b10462d5a"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc7b626e3f19cd79-2a86ce6d-40bc480d-ada4922e-a2dad0952bbadded05a12dc8"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="803feff72ff855de-5cd2f571-4f314243-9a559dc7-033016dc651446b750acbaff"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro> \[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8809c925ffac2d28-2bad34f3-4c514613-9fd79182-6ea20c1e411463e6f53d172b"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f04f0fe738c78572-543a3b67-4c474103-abc5ae72-93376789ef248cd28b6cb5de"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro> \[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8979633fc3d7adc5-728c3f26-49f34b40-a9c2b2f2-e1856876d8e4e6e1e8081379"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fae746a57c8802c-835ba1ea-484a4fa3-af1b9b2f-dec1b70c4f5f02f3f3c60708"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro> \[Permissions 2008\] [Permissions in the Javaâ„¢ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80731b8be12b255c-36706de4-46cd45d8-b7558ac3-ba448e1a7290008bac59342a"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05c638c16bc67bd0-5566aff1-418e4355-8f419acb-2e78802cfb9fc6922af2ef4b"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4aeca5d6e77e68ed-cd544c27-4653418f-b644a075-2c6a56e08f8e523a08c2a0f6"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9310dbcc86e59e97-6081bca4-4be14a94-adbe8ada-d747c443ec1c00a5c976483d"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c813b52f93bec58e-81dbab64-43e741ca-90a4b1cb-b73d26dc7e61d90a7511a43a"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro> \[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8ea90f32f66a0e0-1d0a7541-492a4d62-b01fbbd1-75e0702a7bac8b677b8dca7f"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fea3af56fd2a156-91efe494-48604b45-9bb9b745-9f7f203e1ccb16ae2719278b"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro> \[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20954f865e0b184f-eafa29a6-4a67467d-95d78f99-d7acf0494135fbba576de94e"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro> \[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="caf8fabc51ccb83f-6edf443c-4fbf4c3c-a6a291a7-87baec8e572e027eab306b25"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b2eef39132cb74d-4c9d5155-46a44680-904b8e52-4918945ced49160c88572b3e"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro> \[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2a5db591db5b6ea-90a3f853-47c143fd-9e608707-b6950fb6da097772cd64af8f"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro> \[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63a3580e80e23ce4-da9643e7-46174c39-b8efa3e0-e27a44a8d969118d615d208a"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c680919566e05fe5-931ed97a-49fb4227-a866a60a-4a081c335d19e1ee5c94d35e"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3d2e5373a8caa56-c4bf8f97-47ba466f-abf3b0f2-efcd8e0e6dc767d6e633df34"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5abf9504b12cf3a-ecdd1116-48594bd0-baa79661-61ef8ea7afa30b3574a7869f"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca4279e4ae8a23ae-40339f68-43944d14-952ca87e-f4ae6b8c71d16ebfd4d5752a"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7949620aa6958715-a61a03f2-40124047-a417a2ce-7210c018d711f2f017ceb987"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro> \[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb43788da1c3c9e9-c5f67216-422b4edb-90ea8cf9-1a8346ce4deb136e04432c69"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02510257146d5e6f-8f21dcc8-49ef4c7f-8768afc9-4359a7e17c885b45d81f9a9b"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro> \[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52da762a194b1cb6-9073722c-448a4180-a6c0a24b-07a83b163b20bb87415c6656"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro> \[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b4edb9a73c1d38a-60e5cfa4-4d2c406c-ab3b84d7-c34de0e450f8b6fb7e978b7a"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3adfdadaa946142-97dada56-4bc94f70-9cc3985e-0cc239d727b7a0f71fd632d4"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="053763a40d5a7a43-841497d2-44b34129-be58912a-6657b6f6eec4690ab831f1fa"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e77be5db5a2e9a9e-3bcd6163-4c9446b7-a64fae42-eebbe26a3fe3a24190a04153"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) See [http://www.cert.org/books/secure-coding] for news and errata. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52a5658a6cbbc9fb-8c7ec9ee-49fd42f5-a570bd95-6e7df4980ab7567f6faf1c8d"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db2d13feb2d7b142-56c93052-4d254946-897d8717-77340c08a42475879143dcdf"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ab83313fc325ad1-928b7202-445741ba-8dfc9f89-fb666964487446ddf45850ba"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7e8606099100403-30782132-4248496c-aea7bc44-c4f0b0f24d35727f4011f10f"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro> \[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c63fcfd389a1bc9-9929a30b-41634b3f-a7cfaa59-f5e6f085c2ac99066687d730"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="596babd77abceff2-d001b353-418e49fe-90a98dba-2c1be12ae68e515e2fc74702"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro> \[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="655151d0e294422f-79eae194-4cdd454a-91659351-44487a9466b3a56ca63ca355"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78ff99ebe9031378-c36c222e-4e914f2c-bba9a3ce-31b746594732017c2858bac7"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro> \[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e26b5eab5048d09b-c0cfdef1-46d048f6-8257952d-58792b4f0bba1bdbfed15fe3"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro> \[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08fe06c94ff76a0e-a24c1e31-40a34aa4-999d8a7e-aacab457171cce0c0b4629bd"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro> \[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b704b6c575dad1c-4333e14e-43d84def-9644a9df-0f196f95b7bf17eb948bfb9c"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5968bf447e066375-025b80d4-4c674064-a5f3bc17-9e73f58cf3a2b52a06a5709f"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 2006\] [Javaâ„¢ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aae5570704db63d9-083928d0-49594e08-a63d8949-39cf069792b395343fd8fe6e"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro> \[Sun 2008\] [Javaâ„¢ Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1132bbf58579d50-f9f23adc-43af4803-b95cae14-de8c8a97ada23a7d0060697b"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro> \[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1de453c65d77abe7-32a6533c-4ffd4624-808089ac-6dd6746cb262ad2b356896f9"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro> \[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30bdeb2dc5117a87-d15d1e74-496943a0-9d38b41d-777b3e098c5022d9a59c2e6a"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f20bcc43f8027a25-f2cb77ad-427942a7-aca09d73-37dc10fef871d4aeed4d503e"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro> \[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8226221f896c1f20-6fe3ced1-428a460c-9ca9b8a4-eba75371c5e0699952084f57"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro> \[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html], Oracle Inc. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a007179dedb2188b-c37f0495-4a4445b5-b770a2c0-3ab1d8a675b8d7511354b057"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14b13cdb7c705e94-607f8f6d-40c840f4-8c59a2b6-794a994f5d4b15f235688013"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro> \[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e926ad425b671b6-d60c5799-42e34ecf-9a8a9f7c-38a58fff3f8f013652f5dd45"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro> \[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d21399d479aa0ad4-af3c5148-47c84c15-a87693b3-8a6e97fd02a8dbae6bf85d93"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b7872165c069436-ee633d9f-484e4829-b847a5dc-1d8d4b3502328a2729ef9aea"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro> \[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74ef976488afe7ab-87908d5e-45f44d7a-9d1fb8c1-5c37f18c952965ed54bbea90"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro> \[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa585aa15b7a3cd3-af84af4b-469b47ad-9faab31e-f36fe2fa108c51a748e8261c"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro> \[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="041c726ee3124ce7-5db138d7-473f4258-a9368a53-f044efa666e7e9e59d57a843"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="978b549220347246-7fb6978f-49ba43c2-b4ce8a35-be4e5c667381cbfff462acf5"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004) |